|Publication number||US7209970 B1|
|Application number||US 09/664,893|
|Publication date||Apr 24, 2007|
|Filing date||Sep 19, 2000|
|Priority date||Sep 19, 2000|
|Publication number||09664893, 664893, US 7209970 B1, US 7209970B1, US-B1-7209970, US7209970 B1, US7209970B1|
|Inventors||John Everson, James W. Norris|
|Original Assignee||Sprint Spectrum L.P.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (18), Referenced by (42), Classifications (14), Legal Events (3)|
|External Links: USPTO, USPTO Assignment, Espacenet|
1. Field of the Invention
The present invention relates to the fields of computer authentication, application authorization and user profiling. More particularly, the invention relates to the use of dynamic directory services (DDS) to dynamically store information in a directory server that can be used for authentication, application authorization, and user profiling purposes to eliminate the need for numerous authorization and access control schemes with a single standard directory based set of applications.
2. Description of the Prior Art
Many computer networks require users to be authenticated before they are allowed access thereto. Similarly, many computer applications and/or programs can only be accessed or used by authorized users. Computer users are typically authenticated and/or authorized by access control and security programs that contain or consult user profiles or databases (data repositories) containing access control information for the users. These access control and security programs typically require the entry of user IDs, passwords, etc., before users are allowed access to the networks and/or programs and applications.
Most networks, programs, and applications that have secured entries have their own proprietary access control and security systems (front and back). This requires computer users who wish to gain access to more than one network, application, and/or program during a computer session to repeatedly re-enter their user IDs, passwords, etc., each time they attempt to transfer from one network to another or from one application or program to another. This also requires each network, application, and program to have and maintain its own separate access control information for all users.
The present invention solves the above-described problems and provides a distinct advance in the art of computer authentication and authorization. More particularly, the present invention provides a system and method for authenticating and authorizing computer users with a single, standard, directory-based set of applications.
The present invention combines Dynamic Directory Services (DDS) with a directory access protocol such as the Lightweight Directory Access Protocol (LDAP) to provide authentication and authorization for secured networks, applications, and programs. The present invention uses DDS to store dynamic information such as session information or user ID information in a directory each time a user logs into the system and then maintains the information in the directory until the user logs out. While the information exists in the directory, it can be queried by any other program, application, or network that uses LDAP or other directory protocol to authenticate or authorize the user for the network or application. The present invention therefore eliminates the need to maintain separate access control systems for each secured network, program, or application.
The method and system of the present invention may also be used to provide a more convenient on-line shopping cart and for user profiling and session profiling purposes.
These and other important aspects of the present invention are described more fully in the detailed description below.
A preferred embodiment of the present invention is described in detail below with reference to the attached drawing figure, wherein:
The drawing figure does not limit the present invention to the specific embodiments disclosed and described herein. The drawing Figure is not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the invention.
The present invention combines a directory access protocol such as the Lightweight Directory Access Protocol (LDAP) or X.500 with Dynamic Directory Services (DDS) to provide authentication and application-authorization for secured networks, applications, and programs. Instead of using a directory for static information such as user names, addresses, and phone numbers, however, the present invention uses a directory to store dynamic information such as session information or a shopping cart. When a user logs into the system of the present invention, a user object is created in a directory and remains in the directory until the user logs out of the system. Then, any other applications and/or networks accessed by the computer user during the session may simply query the directory to obtain authorization and authentication information. A simple query to the directory can also indicate how many users are logged into the system at any given moment.
The present invention can be implemented in hardware, software, firmware, or a combination thereof. However, the invention is preferably implemented in software that operates computer and communication equipment such as the equipment identified by the numeral 10 in
The user computers 12 are entirely conventional and may be, for example, personal computers or even internet appliances. The user computers are each preferably equipped with a web browser and an internet connection such as a modem, an ISDN or DSL converter, or a cable modem so that they can access web sites on the Internet in a conventional manner.
The application servers 14 are coupled with the user computers 12 via the communications network 22 and are provided for running applications on behalf of the user computers. The application servers may be any computing devices such as network or server computers. The application servers may be used to handle all application operations between the browser-based computers 12 and a company's back end business applications or databases. Because many databases cannot interpret commands written in HTML, the application servers may serve as translators, allowing computer users to search for information with a browser.
The authorization servers 16 are coupled with the user computers 12 and the application servers 14 via the communications network 22 and are provided for authenticating and authorizing the user computers. The authorization servers may be any computing devices such as network or server computers running Windows NT, Novell Netware, Unix, or any other network operating system. As described in more detail below, the authorization servers may use any means for authenticating and authorizing users such as tokens, certificates, IDs, passwords, and access control measures.
The user profile databases 18 are coupled with the authorization servers 16 via the communications network 22 and are operable for storing certain profile information relating to the users of the user computers 12. The user profile databases may store, for example, user IDs, passwords, access control information such as what applications each computer user is allowed to access, shipping addresses, credit card numbers, information about previous purchases, and any other information useful for authentication, application authorization and user profiling and session profiling/management issues.
The directory 20 is coupled with the authorization servers 16 and the user profile databases 18 via the communications network 22 and is provided for storing directory information used in the present invention as described in more detail below. The directory may reside on any conventional computing device such as one or more network computers or server computers.
The communications network 22 may be a local area network, a wide area network, an intranet, an extranet, the Internet, or any other conventional network or combination of networks. In preferred forms, the user computers 12 may access the authorization servers 16 via the Internet, and the other components of the system 10 communicate via a local or wide area network.
The present invention is fully scalable in that any number of the above described devices of the system 10 can be added as needed. Moreover, none of the devices need to be from a particular vendor, or run on a particular platform. For example, there may be five different authorization servers 16 that perform authentication and authorization of users, but each server may use a different method to authenticate users.
Operation of the computer and communications equipment 10 is controlled by one or more computer programs. Each computer program preferably comprises an ordered listing of executable instructions for implementing logical functions in the authorization servers 16 and the other computing devices as described herein. The computer programs can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device, and execute the instructions. In the context of this application, a “computer-readable medium” can be any means that can contain, store, communicate, propagate or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The computer-readable medium can be, for example, but not limited to, an electronic, magnetic, optical, electro-magnetic, infrared, or semi-conductor system, apparatus, device, or propagation medium. More specific, although not inclusive, examples of the computer-readable medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a random access memory (RAM), a read-only memory (ROM), an erasable, programmable, read-only memory (EPROM or Flash memory), an optical fiber, and a portable compact disk read-only memory (CDROM). The computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance, optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
The following is a description of the operation of a preferred implementation of the present invention. In some alternative implementations, the functions described below in a particular order may occur out of the order described. For example, two steps described separately may in fact be executed substantially concurrently, or may sometimes be executed in the reverse order depending upon the functionality involved.
A user first launches some application or program in a conventional manner with one of the user computers 12. The particular application or program that is launched is not important to the present invention and may include, for example, an internet browser, a Java application, a Java applet, a visual basic application, or any other program or application.
The application is initially directed to one of the authorization servers 16. Which authorization server that is accessed may be based on any criteria including, but not limited to, the first authorization server that answers, a round-robin selection process, geographical criteria, or requirements based on the software or application being used.
The user next logs into the selected authorization server 16 using account or ID information that was established during a user-enrollment/setup process that occurred sometime in the past. The type of account information and authentication or authorization may be specific to the type of applications or network that the user has access to or the role that the user has been assigned.
In accordance with one important aspect of the present invention, the authorization server 16 creates a Session ID for the user after log-in. The Session ID may relate to the date or time that the user logged in, the media access control address of the user's computer 12, the TCP/IP address of the user's computer, the user's name, an account code for the user, a combination of any of these criteria, or any other criteria. It is important only that the Session ID be unique to the user and the particular authorization server 16 that was accessed.
The authorization server 16 then copies or links the Session ID or some derivative thereof to something on the user's computer 12 such as a cookie, shared application memory, or the computer's network address. It is important only that other applications launched by the user from the user computer be able to read or otherwise determine this Session ID by accessing something on the user's computer.
The authorization server 16 also creates an object representing the user or the Session ID and stores it in the directory 20 after log-in. The object name is preferably the same as the Session ID but may be any name relating to the Session ID. After the object is created and stored in the directory, the authorization server copies or parses information about the user from the user profile database 18 and writes this information to the new directory object. The type of information depends on who the user is, what applications the user is allowed to use, what the role of the user is, and how the user was authenticated. The information could even include user IDs and passwords for other applications to provide single log-in or sign-on capabilities. The information may also be encrypted, signed, or otherwise protected for security purposes.
After the user has successfully logged in, the menu or interface of the application the user attempted to launch is loaded so that the user may use the launched application. This function may be performed by the authorization server 16, one of the application servers 14, or any other piece of computer equipment.
The above steps provide a means to authenticate and/or authorize the user for other applications and/or networks. Specifically, when the user attempts to access other applications and/or networks while he or she is still logged into the system, these other applications may reference the Session ID on the user's computer. Using the Session ID, the other applications may read the user information that has been copied to the user's object in the directory for authentication and authorization purposes related to the new applications. The new applications may also be able to modify the information in the object so that the object could pass information to other applications such as in a shopping cart environment described below.
The present invention may be used to replace numerous authorization and access control schemes with one standard, directory-based set of applications. The present invention allows all applications, computer programs, and networks that use a directory access protocol such as LDAP to access all user profile and access control information created for a user while the user is logged into the system. This eliminates the need to create and maintain numerous authorization and access control schemes and requires a user to be authorized only once during a computer session.
The following is a more detailed example of how the above process may be implemented. Assume that the system 10 includes five authorization servers 16 and that a user logs into authorization server number 2 (AS2) with a browser. AS2 first creates a unique, random Session ID for the user such as 82012053249. The authorization server then creates a cookie named “SID” in the user's browser and assigns it a value of AS2.82012053249.
The authorization server 16 also creates an object in the directory 20 and relates it to the Session ID. The object is then populated with information from the user's profile, such as the user's ID, password, e-mail address, account number, etc.
The user is then offered a menu of applications/services that he or she is authorized to use or access. The user may select one of the applications or services, for example a “View Bill” application. The View Bill application accesses the cookie named “SID” on the user's computer 12 and reads the value AS2.82012053249 from the cookie. The application then searches the directory 20 for the object associated with the cookie under the branch of the directory containing information for authorization server AS2. The application reads the associated attributes (i.e. the account number, user ID, password) from the directory to determine what information the user is authorized to access. The View Bill application may then collect authorized information such as billing information from one of the application servers 14 and present it to the user on the screen of the user's computer.
When the user logs off, the object for the user stored in the directory 20 is deleted. The object may be deleted immediately after log-off or after a certain amount of time has elapsed. If the user attempts to log-in after the object has been deleted, the above process may be repeated for the same or even a different authorization server.
Another possible application of the present invention is for on-line shopping carts. Assume, for example, that a user has already logged into the system 10 and that an object for the user has been created in the directory 20. Associated with the user's object is a shopping cart. The user browses shopping selections available via one or more merchandise servers and can add things to and or remove things from the shopping cart. If the user selects a book, for example, and indicates that he or she wants to purchase the book, the ISBN number of the book is added to the user's object in the directory. As the user purchases more items, these items are also added to the user's object in the directory.
When the user is ready to purchase the items, a check-out server queries the object in the directory 20 and obtains information for all of the items selected by the user. The check-out server may be a different server located in a different part of the network or may be connected with the other components in the network. The user information in the object may also contain credit card information so that purchases can be expedited. When the user logs out of the system 10, the user's object in the directory is preferably deleted to make room for objects for other users.
The present invention may also be used to determine how many users are logged into the system 10 at any given moment. Because a user object is created and maintained in the directory 20 whenever a user is logged into the system, a simple query to the directory can indicate how many users are currently logged into the system. For example, the number of objects created under the AS2 branch of the directory indicates how many sessions were established by that particular authorization server. This information can be used to determine which authorization servers are over or under utilized.
Although the invention has been described with reference to the preferred embodiment illustrated in the attached drawing figures, it is noted that equivalents may be employed and substitutions made herein without departing from the scope of the invention as recited in the claims.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5455953 *||Nov 3, 1993||Oct 3, 1995||Wang Laboratories, Inc.||Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket|
|US5689638 *||Dec 13, 1994||Nov 18, 1997||Microsoft Corporation||Method for providing access to independent network resources by establishing connection using an application programming interface function call without prompting the user for authentication data|
|US5710887 *||Aug 29, 1995||Jan 20, 1998||Broadvision||Computer system and method for electronic commerce|
|US5768503 *||Sep 25, 1995||Jun 16, 1998||International Business Machines Corporation||Middleware program with enhanced security|
|US5881225 *||Apr 14, 1997||Mar 9, 1999||Araxsys, Inc.||Security monitor for controlling functional access to a computer system|
|US5884312 *||Feb 28, 1997||Mar 16, 1999||Electronic Data Systems Corporation||System and method for securely accessing information from disparate data sources through a network|
|US5923756 *||Feb 12, 1997||Jul 13, 1999||Gte Laboratories Incorporated||Method for providing secure remote command execution over an insecure computer network|
|US5960411 *||Sep 12, 1997||Sep 28, 1999||Amazon.Com, Inc.||Method and system for placing a purchase order via a communications network|
|US6088451 *||Jun 28, 1996||Jul 11, 2000||Mci Communications Corporation||Security system and method for network element access|
|US6144959 *||Aug 18, 1997||Nov 7, 2000||Novell, Inc.||System and method for managing user accounts in a communication network|
|US6199113 *||Apr 15, 1998||Mar 6, 2001||Sun Microsystems, Inc.||Apparatus and method for providing trusted network security|
|US6243816 *||Apr 30, 1998||Jun 5, 2001||International Business Machines Corporation||Single sign-on (SSO) mechanism personal key manager|
|US6301661 *||Jun 19, 1999||Oct 9, 2001||Verizon Labortories Inc.||Enhanced security for applications employing downloadable executable content|
|US6360249 *||Jun 26, 2000||Mar 19, 2002||I2 Technologies Us, Inc.||Enterprise interaction hub for managing an enterprise web system|
|US6480894 *||Jun 13, 2000||Nov 12, 2002||I2 Technologies Us, Inc.||System and method for maintaining a state for a user session using a web system|
|US6539482 *||Apr 8, 1999||Mar 25, 2003||Sun Microsystems, Inc.||Network access authentication system|
|US6598057 *||Dec 22, 1999||Jul 22, 2003||Cisco Technology, Inc.||Method and apparatus for generating configuration files using policy descriptions|
|US6654891 *||Oct 29, 1998||Nov 25, 2003||Nortel Networks Limited||Trusted network binding using LDAP (lightweight directory access protocol)|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7823192 *||Apr 1, 2004||Oct 26, 2010||Sprint Communications Company L.P.||Application-to-application security in enterprise security services|
|US7895463||Apr 11, 2008||Feb 22, 2011||Cisco Technology, Inc.||Redundant application network appliances using a low latency lossless interconnect link|
|US7913529||Apr 11, 2008||Mar 29, 2011||Cisco Technology, Inc.||Centralized TCP termination with multi-service chaining|
|US7921686||Apr 11, 2008||Apr 12, 2011||Cisco Technology, Inc.||Highly scalable architecture for application network appliances|
|US7969986 *||Aug 4, 2005||Jun 28, 2011||Tadiran Telecom Ltd.||Method and device for using a data object representing a user in a distributed communication network|
|US8041689 *||Nov 30, 2006||Oct 18, 2011||Red Hat, Inc.||Flexible LDAP templates|
|US8065193||Jun 6, 2009||Nov 22, 2011||Bullock Roddy Mckee||Method for making money on the internet|
|US8086710||Oct 30, 2007||Dec 27, 2011||Quest Software, Inc.||Identity migration apparatus and method|
|US8087075||Feb 13, 2006||Dec 27, 2011||Quest Software, Inc.||Disconnected credential validation using pre-fetched service tickets|
|US8090686||Feb 13, 2007||Jan 3, 2012||Red Hat, Inc.||Multi-master attribute uniqueness|
|US8094560||May 19, 2008||Jan 10, 2012||Cisco Technology, Inc.||Multi-stage multi-core processing of network packets|
|US8103553||Oct 6, 2009||Jan 24, 2012||Bullock Roddy Mckee||Method for making money on internet news sites and blogs|
|US8145616||Jan 22, 2007||Mar 27, 2012||Red Hat, Inc.||Virtual attribute configuration source virtual attribute|
|US8161167||Apr 11, 2008||Apr 17, 2012||Cisco Technology, Inc.||Highly scalable application layer service appliances|
|US8180901||Apr 11, 2008||May 15, 2012||Cisco Technology, Inc.||Layers 4-7 service gateway for converged datacenter fabric|
|US8245242||Nov 4, 2009||Aug 14, 2012||Quest Software, Inc.||Systems and methods for managing policies on a computer|
|US8255984||Jul 1, 2010||Aug 28, 2012||Quest Software, Inc.||Single sign-on system for shared resource environments|
|US8295306||Apr 11, 2008||Oct 23, 2012||Cisco Technologies, Inc.||Layer-4 transparent secure transport protocol for end-to-end application protection|
|US8296189||Jan 8, 2012||Oct 23, 2012||Bullock Roddy Mckee||Method for monetizing internet news sites and blogs|
|US8296192||Nov 13, 2011||Oct 23, 2012||Bullock Roddy Mckee||Method for making money on the internet|
|US8332817 *||Nov 8, 2005||Dec 11, 2012||Red Hat, Inc.||Certifying a software application based on identifying interface usage|
|US8346908||Dec 13, 2011||Jan 1, 2013||Quest Software, Inc.||Identity migration apparatus and method|
|US8429712 *||Jun 18, 2006||Apr 23, 2013||Quest Software, Inc.||Centralized user authentication system apparatus and method|
|US8443069||Mar 24, 2011||May 14, 2013||Cisco Technology, Inc.||Highly scalable architecture for application network appliances|
|US8479281||Mar 26, 2008||Jul 2, 2013||Dell Products L.P.||Authentication management methods and media|
|US8533744||Jul 31, 2012||Sep 10, 2013||Dell Software, Inc.||Systems and methods for managing policies on a computer|
|US8584218||Dec 21, 2011||Nov 12, 2013||Quest Software, Inc.||Disconnected credential validation using pre-fetched service tickets|
|US8600933||Dec 23, 2011||Dec 3, 2013||Red Hat, Inc.||Multi-master attribute uniqueness|
|US8607360 *||Feb 8, 2011||Dec 10, 2013||Canon Kabushiki Kaisha||Data delivery apparatus and data delivery method|
|US8621573||Apr 11, 2008||Dec 31, 2013||Cisco Technology, Inc.||Highly scalable application network appliances with virtualized services|
|US8667556||May 19, 2008||Mar 4, 2014||Cisco Technology, Inc.||Method and apparatus for building and managing policies|
|US8677453||May 19, 2008||Mar 18, 2014||Cisco Technology, Inc.||Highly parallel evaluation of XACML policies|
|US8713583||Sep 9, 2013||Apr 29, 2014||Dell Software Inc.||Systems and methods for managing policies on a computer|
|US8966045||Nov 27, 2012||Feb 24, 2015||Dell Software, Inc.||Identity migration apparatus and method|
|US8978098||Apr 17, 2013||Mar 10, 2015||Dell Software, Inc.||Centralized user authentication system apparatus and method|
|US9100371||Apr 10, 2013||Aug 4, 2015||Cisco Technology, Inc.||Highly scalable architecture for application network appliances|
|US9130847||Apr 28, 2014||Sep 8, 2015||Dell Software, Inc.||Systems and methods for managing policies on a computer|
|US20040117439 *||Feb 12, 2002||Jun 17, 2004||Levett David Lawrence||Client software enabling a client to run a network based application|
|US20060146800 *||Aug 4, 2005||Jul 6, 2006||Tadiran Telecom Ltd.||Use of data object in a distributed communication network|
|US20070168957 *||Nov 8, 2005||Jul 19, 2007||Red Hat, Inc.||Certifying a software application based on identifying interface usage|
|US20110138482 *||Jun 9, 2011||Canon Kabushiki Kaisha||Data delivery apparatus and data delivery method|
|USRE45327||Mar 7, 2013||Jan 6, 2015||Dell Software, Inc.||Apparatus, systems and methods to provide authentication services to a legacy application|
|U.S. Classification||709/229, 709/228, 703/4, 709/227|
|Cooperative Classification||H04L63/102, H04L29/12047, H04L63/08, H04L61/15, H04L29/12009|
|European Classification||H04L63/08, H04L61/15, H04L29/12A, H04L29/12A2|
|Sep 19, 2000||AS||Assignment|
Owner name: SPRINT SPECTRUM, L.P., MISSOURI
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:EVERSON, JOHN;NORRIS, JAMES W.;REEL/FRAME:011101/0780
Effective date: 20000912
|Sep 30, 2010||FPAY||Fee payment|
Year of fee payment: 4
|Oct 22, 2014||FPAY||Fee payment|
Year of fee payment: 8